Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-4328

Опубликовано: 02 авг. 2023
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2023-4328: samba security and bug fix update (MODERATE)

[4.17.5-3.0.1]

  • Fix memleak in _nss_winbind_initgroups_dyn [Orabug: 34727815]
  • Gluster volumes not accessible via Samba due to missing samba-vfs-glusterfs in OL8 [Orabug: 30205755]

[4.17.5-3]

  • resolves: rhbz#2223601 - Fix trust relationship between workstation and DC
  • resolves: rhbz#2222895 - Fix CVE-2023-3347

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

ctdb

4.17.5-3.0.1.el8_8

libnetapi

4.17.5-3.0.1.el8_8

libnetapi-devel

4.17.5-3.0.1.el8_8

libsmbclient

4.17.5-3.0.1.el8_8

libsmbclient-devel

4.17.5-3.0.1.el8_8

libwbclient

4.17.5-3.0.1.el8_8

libwbclient-devel

4.17.5-3.0.1.el8_8

python3-samba

4.17.5-3.0.1.el8_8

python3-samba-dc

4.17.5-3.0.1.el8_8

python3-samba-devel

4.17.5-3.0.1.el8_8

python3-samba-test

4.17.5-3.0.1.el8_8

samba

4.17.5-3.0.1.el8_8

samba-client

4.17.5-3.0.1.el8_8

samba-client-libs

4.17.5-3.0.1.el8_8

samba-common

4.17.5-3.0.1.el8_8

samba-common-libs

4.17.5-3.0.1.el8_8

samba-common-tools

4.17.5-3.0.1.el8_8

samba-dc-libs

4.17.5-3.0.1.el8_8

samba-dcerpc

4.17.5-3.0.1.el8_8

samba-devel

4.17.5-3.0.1.el8_8

samba-krb5-printing

4.17.5-3.0.1.el8_8

samba-ldb-ldap-modules

4.17.5-3.0.1.el8_8

samba-libs

4.17.5-3.0.1.el8_8

samba-pidl

4.17.5-3.0.1.el8_8

samba-test

4.17.5-3.0.1.el8_8

samba-test-libs

4.17.5-3.0.1.el8_8

samba-tools

4.17.5-3.0.1.el8_8

samba-usershares

4.17.5-3.0.1.el8_8

samba-vfs-glusterfs

4.17.5-3.0.1.el8_8

samba-vfs-iouring

4.17.5-3.0.1.el8_8

samba-winbind

4.17.5-3.0.1.el8_8

samba-winbind-clients

4.17.5-3.0.1.el8_8

samba-winbind-krb5-locator

4.17.5-3.0.1.el8_8

samba-winbind-modules

4.17.5-3.0.1.el8_8

Oracle Linux x86_64

ctdb

4.17.5-3.0.1.el8_8

libnetapi

4.17.5-3.0.1.el8_8

libnetapi-devel

4.17.5-3.0.1.el8_8

libsmbclient

4.17.5-3.0.1.el8_8

libsmbclient-devel

4.17.5-3.0.1.el8_8

libwbclient

4.17.5-3.0.1.el8_8

libwbclient-devel

4.17.5-3.0.1.el8_8

python3-samba

4.17.5-3.0.1.el8_8

python3-samba-dc

4.17.5-3.0.1.el8_8

python3-samba-devel

4.17.5-3.0.1.el8_8

python3-samba-test

4.17.5-3.0.1.el8_8

samba

4.17.5-3.0.1.el8_8

samba-client

4.17.5-3.0.1.el8_8

samba-client-libs

4.17.5-3.0.1.el8_8

samba-common

4.17.5-3.0.1.el8_8

samba-common-libs

4.17.5-3.0.1.el8_8

samba-common-tools

4.17.5-3.0.1.el8_8

samba-dc-libs

4.17.5-3.0.1.el8_8

samba-dcerpc

4.17.5-3.0.1.el8_8

samba-devel

4.17.5-3.0.1.el8_8

samba-krb5-printing

4.17.5-3.0.1.el8_8

samba-ldb-ldap-modules

4.17.5-3.0.1.el8_8

samba-libs

4.17.5-3.0.1.el8_8

samba-pidl

4.17.5-3.0.1.el8_8

samba-test

4.17.5-3.0.1.el8_8

samba-test-libs

4.17.5-3.0.1.el8_8

samba-tools

4.17.5-3.0.1.el8_8

samba-usershares

4.17.5-3.0.1.el8_8

samba-vfs-glusterfs

4.17.5-3.0.1.el8_8

samba-vfs-iouring

4.17.5-3.0.1.el8_8

samba-winbind

4.17.5-3.0.1.el8_8

samba-winbind-clients

4.17.5-3.0.1.el8_8

samba-winbind-krb5-locator

4.17.5-3.0.1.el8_8

samba-winbind-modules

4.17.5-3.0.1.el8_8

samba-winexe

4.17.5-3.0.1.el8_8

Связанные CVE

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 2 лет назад

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.

CVSS3: 5.9
redhat
около 2 лет назад

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.

CVSS3: 5.9
nvd
около 2 лет назад

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.

CVSS3: 5.9
debian
около 2 лет назад

A vulnerability was found in Samba's SMB2 packet signing mechanism. Th ...

CVSS3: 5.9
github
около 2 лет назад

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.